The reverse statistical disclosure attack

  • Authors:
  • Nayantara Mallesh;Matthew Wright

  • Affiliations:
  • Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX;Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX

  • Venue:
  • IH'10 Proceedings of the 12th international conference on Information hiding
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on finding the receivers to whom a given targeted user sends. In this paper, we investigate the effectiveness of statistical disclosure in finding all of a users' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted user's most likely contacts. We study the performance of RSDA in simulation using different mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the user's contacts, particularly as the amounts of user traffic and cover traffic rise.